Open Source
Authentik is an open-source identity provider, which means you can access and modify the source code to suit your needs without licensing fees.
Flexible Authentication Methods
Authentik supports a variety of authentication methods, including traditional username/password, OAuth, SAML, and LDAP, allowing integration with diverse systems.
User Interface and Experience
Provides an intuitive and user-friendly interface for administrators to manage user identities and configure authentication workflows.
Docker Deployment
Easily deployable via Docker, which simplifies the installation and scaling processes, making it adaptable to different environments.
Community Support
Being open-source, authentik benefits from community contributions which can lead to faster improvements and support through forums and community channels.
I've replaced keycloak with https://goauthentik.io/ 2 years on, no complaints. - Source: Hacker News / 23 days ago
So, https://goauthentik.io/ actually supports totp with ldap as well. https://docs.goauthentik.io/docs/providers/ldap#binding--bind-modes And the parent makes a good point that OIDC/OAuth does not give group membership. - Source: Hacker News / 2 months ago
Absolutely, wouldn't mind OIDC/OAuth. I use https://goauthentik.io/ So, I would love OAuth. Teedy supports only LDAP so that's what I'm using right now. - Source: Hacker News / 2 months ago
While authelia is quite cool "infra-as-code" tool, since you have your entire configuration in yaml form, for those not willing to spend a few evenings configuring SSO, there is authentik [1] which features management UI. Offers similar feature set, also self-hostable, but most importantly - simple to set-up. I've spent 8h on authelia deployment, where 30 minutes in authentik would be sufficient. But both are good... - Source: Hacker News / 5 months ago
Authentik Security | Engineer | US | REMOTE (anywhere) | Full-time Authentik Security (https://goauthentik.io) is the company behind authentik (https://github.com/goauthentik/authentik. - Source: Hacker News / 6 months ago
If you're looking for a system that has more features, is user friendly, a nice admin ui and easy deployments compared to Keycloak. Please give https://goauthentik.io/ a shot. Not affiliated in any way, just a very happy user. It has -an admin UI - Supports (LDAP, SAML, OAUTH, social logins) - MFA, Passkeys - Application access based on user groups etc. - Source: Hacker News / 8 months ago
I've been eyeing authentik[1] and authelia[2]. Authelia looks really good to me, but the fact that keycloak has connectors for angular and you need to setup oidc angular plugins with authelia for example made me a little bit wary. But I guess having a config for Keycloak makes it's easier to get started. [1] https://goauthentik.io/ [2] https://www.authelia.com/. - Source: Hacker News / 10 months ago
I've been searching around for a while now, and struggling with getting Authentik setup on my NAS. I'd like to deploy via Portainer, but getting lost in the documentation just to deploy. Source: almost 1 year ago
Personally I went with Keycloak, because it's fairly well documented and also has Docker images available: https://www.keycloak.org/getting-started/getting-started-docker although the fact that they want you to create an "optimized" image yourself and have a long build/setup process on startup instead is slightly annoying: https://www.keycloak.org/server/containers Regardless, with something like mod_auth_openidc... - Source: Hacker News / about 1 year ago
Hello ! I am hosting a server under NixOS with multiple services, and to simply the identity management, I use authentik (https://goauthentik.io/) which can be compared to keycloak. Everything works fine until I try to enable mastodon to host an instance : authentik returns an error 400 and nothing changes this but disabling mastodon. Does anyone have an idea of what could be the cause of this ? Source: over 1 year ago
My thought is to have the ZAC only be accessible to users connected to OpenZiti, and to have the ZAC behind/to the side of Authentik for SSO. Source: over 1 year ago
What do folks think about authentik[0]? I tried to set up Keycloak but after fiddling with it for awhile before giving up and trying something else. It felt really weird that I was just extracting a tar and running a jar instead of some pre-packaged solution, but that might just be me. Authentik was pretty easy to set up for my homelab, but maybe I'm missing something given all the positive recommendations for... - Source: Hacker News / over 1 year ago
Has anybody been able to get Authentik working with Docker swarm? I'm hitting a brick wall and struggling to work out where the issue is. I can get it up and running using Docker Compose without any issues. Source: over 1 year ago
Cloudflare Tunnels to hide your public IP (no firewall rules allowing traffic to public IP, only private traffic through tunnel), Cloudflare Access to protect services when outside of your network. Optionally Authentik to provide a unified authentication solution to all your services and act as an IDP for Cloudflare Access (or you can use Google, Microsoft login, etc.). Source: over 1 year ago
Last week I looked at more popular solutions such as Authelia and Authentik. Both seem rather trivial too implement, although Authelia doesn't have a management UI. Authentik seems to have a pretty large footprint from what I've read. Source: over 1 year ago
Edit: Some very helpful person on the Matrix suggested Authentik rather than Authelia, as it has support for LDAP, which Jellyfin supports natively. Source: over 1 year ago
I had the same dilemma as you have and after a lot of research I decided to go with Authentik. It has a dashboard (I don’t use it), option of using 2FA, SSO, nginx built in for reverse proxy and much more. It’s a little bit rough to get started but it has everything you could possible need. Source: over 1 year ago
How does zitadel compare to authentik (https://goauthentik.io/) or authelia (https://www.authelia.com/)? - Source: Hacker News / over 1 year ago
Hi there u/THMMYos ! InvenTree supports OIDC or OAuth. From personal usage, I can confirm that InvenTree with OIDC and authentik (https://goauthentik.io/) work great together! Authentik in general is a great solution, it supports federation with other providers, a lot of different protocols and supports very versatile tools for transforming user attributes. Source: over 1 year ago
You can try Authentik instead, their UI is kinda neet. Source: over 1 year ago
I use Authentik as well, It's fairly straight forward, flexible, and offers many different forms of auth. You can create all sorts of different Auth flows to suit your needs. I use it as a directory as well as the Identity Provider for all my internal web apps. While you can add a directory as a source it contains an internal directory so its self-contained and simple yet if you wanted to add a directory store(... Source: over 1 year ago
Do you know an article comparing authentik to other products?
Suggest a link to a post with product alternatives.
This is an informative page about authentik. You can review and discuss the product here. The primary details have not been verified within the last quarter, and they might be outdated. If you think we are missing something, please use the means on this page to comment or suggest changes. All reviews and comments are highly encouranged and appreciated as they help everyone in the community to make an informed choice. Please always be kind and objective when evaluating a product and sharing your opinion.